Amos |
Abbott |
2136915 |
EAGER: Biometric Authentication using Noncontact Cardiovascular Signals |
Nael |
Abu-Ghazaleh |
CNS-1619322, 1617915 |
Collaborative Research: SaTC: CORE: Medium: Leakage-free Isolated Execution: Architectures and Security Models |
Yuvraj |
Agarwal |
1801472 |
SaTC: Core: End-to-End Support for Privacy in the Internet-of-Things |
Khair |
Al Shamaileh |
2006662 |
Jamming Detection and Classification in OFDM-based UAVs via Feature- and Spectrogram-tailored Machine Learning |
Laura |
Albert |
2000986 |
SaTC: CORE: Medium: An Optimization Framework for Identifying Dynamic Risk Management Practices |
Ahmad |
Alsharif |
2153464 |
CRII: SaTC: RUI: Towards Trustworthy and Accountable IoT Data Marketplaces |
Mary Jean |
Amon |
2053152 |
Bottom-up Psychosocial Interventions for Interpersonal Privacy Preservation in Social Media |
Nazanin |
Andalibi |
2020872 |
Towards Accounting for the Human in Emotion Recognition Technologies |
Sebastian |
Angel |
2045861 |
CAREER: Tools For Building Online Services That Hide Metadata |
Mohd |
Anwar |
2007662 |
Tracking User Behavior, Cognitive Burdens, and the Impact of Behavioral Nudging on Security Updates by Young and Older Adults |
Navid |
Asadi |
1821780 |
PHIKS - PHysical Inspection and attacKs on electronicS |
Adam |
Aviv |
1845300 |
CAREER: Enhancing Mobile Authentication by Measuring the Authentication Life-Cycle |
Adam |
Aviv |
2138654, 2138078 |
Collaborative Research: SaTC: EDU: Security and Privacy Implications of Remote Proctoring for School Policies and Practices |
Erman |
Ayday |
2050410 |
SaTC: CORE: Small: Robust, Privacy- and Utility-Preserving Fingerprinting Schemes for Correlated Data |
Anys |
Bacha |
CNS-1947580 |
An Integrated Treatment of Ransomware Through Microarchitecture and Software Solutions |
Ibrahim |
Baggili |
1900210 |
Expanding Digital Forensics Education with Artifact Curation and Scalable, Accessible Artifact Exercises |
Hamid |
Bahrami |
1956110 |
SaTC: CORE: Small: A Practical Approach to Study Security in Wireless Networks |
Shi |
Bai |
2122229 |
Cryptographic Hardness of Module Lattices |
Shi |
Bai |
2044855 |
CAREER: Concrete Hardness in Lattice-based Cryptography |
Kiran |
Balagani |
1814846 |
Leveraging Movement, Posture, and Anthropometric Contexts to Strengthen the Security of Mobile Biometric |
Alexandru |
Bardas |
1850406 |
CRII: SaTC: Creating and Managing Structurally-Morphing IT Systems - Moving Targets |
Alexandru |
Bardas |
1915824, 1915822 |
DCL: SaTC: Early-Stage Interdisciplinary Collaboration: A Sociotechnical Metrics Framework for Network and Security Operation Centers |
Lujo |
Bauer |
1801391, 2113345 |
SaTC: CORE: Medium: Collaborative: Using Machine Learning to Build More Resilient and Transparent Computer Systems |
France |
Belanger |
SES-2039172 |
Information Privacy Tensions and Decisions in Families during COVID-19 |
Terry |
Benzel |
1925773, 1925616, 1925564, 1925588 |
Sharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH) |
Julia |
Bernd |
2114229, 2114230 |
Foregrounding Bystanders as Stakeholders in Smart Home Product Design |
Raheem |
Beyah |
1929580 |
ADIDS: An Air-gapped Distributed Intrusion Detection System for the Power Grid |
Nicola |
Bezzo |
11816591 |
Online Malicious Intent Inference for Safe CPS Operations under Cyber-attacks |
Shameek |
Bhattacharjee |
2030611 |
SaTC CORE: Small: TAURUS: Towards a Unified Robust and Secure Data Driven Approach for Attack Detection in Smart Living |
Vincent |
Bindschaedler |
2055123 |
SaTC: CORE: Medium: Countering Surveillanceware Using Deception-Based Generative Models and Systems Mechanisms |
Gedare |
Bloom |
2046705 |
CAREER: Foundations for Real-Time System Security |
Alexandra |
Boldyreva |
1946919 |
Provable Security Analysis of FIDO2 Protocol for Passwordless Authentication on the Web |
Borzoo |
Bonakdarpour |
2100989 |
SaTC:CORE:Small:Techniques for Software Model Checking of Hyperproperties |
Shaunak D. |
Bopardikar |
2134076 |
SaTC: CORE: SMALL: Data-driven Attack and Defense Modeling for Cyber-physical Systems (CPS) |
Travis |
Breaux |
2007298 |
Privacy Impact and Risk Assessment at Design-Time |
Zhipeng |
Cai |
1912753 |
SaTC: EDU: Collaborative: Advancing Cybersecurity Learning Through Inquiry-based Laboratories on a Container-based Virtualization Platform |
Kelly |
Caine |
1940679 |
Cryptographic Provenance for Digital Publishing |
L. Jean |
Camp |
1565375 |
TWC: Large: Collaborative: Living in the Internet of Things |
Yinzhi |
Cao |
1854000 |
TWC: Medium: Collaborative: Efficient Repair of Learning Systems via Machine Unlearning |
Justin |
Cappos |
1801376 |
NSF SaTC: TTP: Medium: Collaborative: Securing the Software Supply Chain |
Bogdan |
Carbunar |
2013671 |
SaTC: CORE: Small: Deconstructing and Neutralizing Search Rank Fraud |
Bogdan |
Carbunar |
2114911 |
Collaborative Research: EAGER: SaTC-EDU: Just-in-Time AI Driven Cyber Abuse Education in Social Networks |
Krishnendu |
Chakrabarty |
2049335 |
Secure and Trustworthy Cyberphysical Microfluidic Systems |
Krishnendu |
Chakrabarty |
2011561 |
Security of FPGA-as-a-Service Reconfigurable Systems |
David |
Chan-Tin |
1919004, 1918591 |
SaTC: EDU: Collaborative: Personalized Cybersecurity Education and Training |
Bo |
Chen |
1938130 |
EAGER: Enabling Secure Data Recovery for Mobile Devices against Malicious Attacks |
Hao |
Chen |
1801751 |
SaTC: CORE: Medium: Collaborative: Towards Robust Machine Learning Systems |
Hsinchun |
Chen |
1936370 |
SaTC: CORE: Small: Cybersecurity Big Data Research for Hacker Communities: A Topic and Language Modeling Approach |
Hsinchun |
Chen |
CNS-2041770 |
CRII: SaTC: Identifying Emerging Threats in the Online Hacker Community for Proactive Cyber Threat Intelligence |
Hsinchun |
Chen |
2038483 |
EAGER: SaTC-EDU: AI-Cybersecurity Research and Education (AI4Cyber) at Scale |
Qi |
Chen |
1930041, 1929771 |
Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs |
Yingying |
Chen |
1820624 |
Exploiting Physical Properties in Wireless Networks for Implicit Authentication |
Yingying |
Chen |
2114220, 2114161 |
Securing IoT and Edge Devices under Audio Adversarial Attacks |
Yu |
Chen |
CNS-2039342 |
EAGER: SAVED: Secure Audio and Video Data from Deepfake Attacks Leveraging Environmental Fingerprints |
Long |
Cheng |
2114920, 2114982, 2114936 |
EAGER: SaTC-EDU: Learning Platform and Education Curriculum for Artificial Intelligence-Driven Socially-Relevant Cybersecurity |
Adam |
Chlipala |
2130671 |
Scaling Correct-by-Construction Code Generation for Cryptography |
Christopher |
Clifton |
CNS-2114123, 2114141 |
Broad-Spectrum Facial Image Protection with Provable Privacy Guarantees |
Christian |
Collberg |
2040206 |
The Tigress Endpoint Protection Tool - Transition to Practice |
Henry |
Corrigan-Gibbs |
CNS-2054869 |
Practical Private Information Retrieval |
Matthew |
Costello |
2014065 |
RAPID: Exploring the New Wave of Cyber-Harassment Linked to COVID-19 |
Dana |
Dachman-Soled |
1933033 |
SaTC: CORE: Small: Meta Coding and Applications in Cryptography |
Alberto |
Dainotti |
1705024 |
Investigating the Susceptibility of the Internet Topology to Country-level Connectivity Disruption and Manipulation |
Melissa |
Dark |
2117073 |
Assessment Resources for Cybersecurity (ARC) project |
Anupam |
Das |
1849997 |
CRII: SaTC: Analyzing Information Leak in Smart Homes |
Sauvik |
Das |
2029519 |
Corporeal Cybersecurity |
Sauvik |
Das |
2126058 |
Privacy Through Design |
Azadeh |
Davoodi |
1812600 |
SaTC: STARSS: Small: Analysis of Security and Countermeasures for Split Manufacturing of Integrated Circuits |
Saumya |
Debray |
1908313 |
Reasoning about Dependencies and Information Flow in Dynamic Code |
Leigh Ann |
DeLyser |
2028426 |
JROTC-CS Impact Study |
Srini |
Devadas |
2115587 |
Provably Secure, Usable, and Performant Enclaves in Multicore Processors |
Thang |
Dinh |
2140477, 2140411 |
Collaborative Research: SaTC: EAGER: Trustworthy and Privacy-preserving Federated Learning |
YEVGENIY |
DODIS |
2055578 |
Making Crypto Too BIG To Break |
YEVGENIY |
DODIS |
1815546 |
On the Power of Preprocessing and Non-Uniformity |
Shiri |
Dori-Hacohen |
2147305 |
FAI: BRIMI - Bias Reduction In Medical Information |
Christopher |
Doss |
2039612, 2039613, 2039614 |
EAGER: SaTC AI-Cybersecurity: Safeguarding STEM Education and Scientific Knowledge in the age of Hyper realistic AI-Generated Data |
Ramakrishnan |
Durairajan |
2132651, 2132643, 2132639 |
ONSET: Optics-enabled Network Defenses for Extreme Terabit DDoS Attacks |
Manuel |
Egele |
1916393, 1916398 |
Taming Memory Corruption with Security Monitors |
Kirsten |
Eisentraeger |
2001470 |
Classical and Quantum Algorithms For Number-Theoretic Problems Arising in Cryptography |
Salim |
El Rouayheb |
1801630 |
Secure Distributed Coded Computations for IoT: An Information Theoretic and Network Approach |
William |
Enck |
2054911, 2055014 |
Collaborative Research: SaTC: CORE: Medium: Enabling Practically Secure Cellular Infrastructure |
William |
Enck |
1946273 |
SaTC: CORE: Small: Detecting Vulnerabilities and Remediations in Software Dependencies |
Michalis |
Faloutsos |
2132642 |
SOFIA: Finding and Profiling Malware Source-Code in Public Archives at Scale |
Liyue |
Fan |
1949217 |
Image Publication with Differential Privacy |
Liyue |
Fan |
CNS-1951430 |
Privacy-Preserving Mobile Data Collection for Social and Behavioral Research |
Fariborz |
Farahmand |
2041788 |
Advancing Cybersecurity Education to Human-Level Artificial Intelligence |
Lisa |
Fazio |
2122640 |
SaTC: CORE: Small: How False Beliefs Form and How to Correct Them |
Earlence |
Fernandes |
2144376 |
Security and Privacy Foundations of Internet-Scale User-Centered Automation |
Renato |
Figueiredo |
1814557 |
FIRMA: Personalized Cross-Layer Continuous Authentication |
Renato |
Figueiredo |
2028734 |
Lumen: A Machine Learning Framework to Expose Influence Cues in Texts |
Ferdinando |
Fioretto |
2133169 |
Collaborative Research: SaTC: CORE: Small: Privacy and Fairness in Critical Decision Making |
Alvis |
Fong |
2017289 |
CyberTraining: Pilot: Modular Experiential Learning for Secure, Safe, and Reliable AI (MELSSRAI) |
Domenic |
Forte |
1717392 |
iPROBE - An Internal Shielding Approach for Protecting against Frontside and Backside Probing Attacks |
Xing |
Gao |
2054657 |
CRII: SaTC: Securing Containers in Multi-Tenant Environment via Augmenting Linux Control Groups |
Lixin |
Gao |
1918187 |
Privacy-Preserving Policy Verification of Interdomain Routing |
Christina |
Garman |
2047991 |
Removing the Human Element: Securing Deployed Cryptographic Systems through the use of Cryptographic Automation |
Jean-Luc |
Gaudiot |
2026675 |
Securing Information Systems with Flexible Hardware Techniques |
Daniel |
Genkin |
CNS-1954712 |
CORE: Medium: Collaborative: Hardening Off-the-Shelf Software Against Side Channel Attacks |
Sandra |
Gonzalez-Bailon |
2017655 |
Behavioral Effects of Exposure to Extremist Content in Social Media |
Guofei |
Gu |
1816497 |
Adversarial Learning via Modeling Interpretation |
Danna |
Gurari |
2126314 |
Novel Algorithms and Tools for Empowering People Who Are Blind to Safeguard Private Visual Content |
Nikhil |
Gupta |
DGE-1931724 |
SaTC-EDU: Collaborative: Cybersecurity Education for Additive Manufacturing |
Maanak |
Gupta |
2025682 |
Collaborative Research: SaTC: EDU: Artificial Intelligence Assisted Malware Analysis |
Shuang |
Hao |
2146448 |
CAREER: Empowering White-box Driven Analytics to Detect AI-synthesized Deceptive Content |
Ian |
Harris |
1813858 |
Detecting Social Engineering Attacks Using Semantic Language Analysis |
John |
Harris |
1801599 |
REVELARE: A Hardware-Supported Dynamic Information Flow Tracking Framework for IoT Security and Forensics |
Willie |
Harrison |
1910812 |
CIF: Small: Best Wiretap Codes for Real-world Physical-layer Security |
Ting |
He |
1946022 |
SaTC: CORE: Small: Adversarial Network Reconnaissance in Software Defined Networking |
Nadia |
Heninger |
1913167, 1913210 |
Short Vectors in Lattices |
Nadia |
Heninger |
2048563 |
CAREER: Cryptographic Security at Internet Scale |
Matthew |
Hicks |
2046589 |
CAREER: Designing and Defending Novel Ultra-stealthy andControllable Design-time Analog-domain Hardware Trojans |
Viet Tung |
Hoang |
1755539 |
Towards Stronger and Verified Security for Real-World Cryptography |
Viet Tung |
Hoang |
2046540 |
New Analytic Frontiers for Symmetric Cryptography |
Yuan |
Hong |
CNS-2034870, 2034615 |
Collaborative Research: SaTC: CORE: Small: Privately Collecting and Analyzing V2X Data for Urban Traffic Modeling |
Nicholas |
Hopper |
1815757 |
Models and Measurements for Website Fingerprinting |
Nicholas |
Hopper |
1814753 |
Consistent and Private Group Communication |
Khaza Anuarul |
Hoque |
2114035 |
Modeling and Defense of Cyber Attacks for Improving Social Virtual Reality Resilience |
Tamzidul |
Hoque |
2114157, 2114165, 2114200 |
Hardware Security Education for All Through Seamless Extension of Existing Curricula |
Amir |
Houmansadr |
1553301 |
CAREER: Sustainable Censorship Resistance Systems for the Next Decade |
Justin |
Hsu |
2152831 |
CORE: Medium: SPIPS: Security and Privacy in Programmable Switches |
Fei |
Hu |
DGE#1723250 |
Captivology-Stimuli-based Learning (CAPITAL) of Big Data Security (BigSec): Towards a Science/Engineering, Career-Oriented Train |
Hongxin |
Hu |
2129164 |
CAREER: Towards Elastic Security with Safe and Efficient Network Security Function Virtualization |
Jeff |
Huang |
1901482 |
New Defenses for Data-Only Attacks |
Cahrles |
Hughes |
2114808 |
Improving Cybersecurity Education for Adolescents with Autism Through Automated Augmented Self-Monitoring Applications |
Stratis |
Ioannidis |
1717213 |
MaSSIF: Massively Scalable Secure Computation Infrastructure using FPGAs |
Trent |
Jaeger |
1801534 |
DataGuard System - "The Taming of the Stack" - NDSS 2022 |
Shweta |
Jain |
CNS-2131182 |
CISE: MSI: Cultivating and Developing Research Talent to Support Research in Cyber-Security |
Ahmad |
Javaid |
1903419, 1903423 |
INteractive Animated VIsualization and PracTice basEd Cybersecurity Curriculum and Training (InviteCyber) Framework |
Sampath |
Jayarathna |
2149607 |
REU Site: Research Experiences for Undergraduates in Disinformation Detection and Analytics |
Limin |
Jia |
1704542 |
Towards a Usable, Practical, and Provably Secure Browser Infrastructure |
Limin |
Jia |
CNS-2114148, 2114074 |
Toward Safe, Private, and Secure Home Automation: From Formal Modeling to User Evaluation |
Naima |
Kaabouch |
2006674 |
GPS Spoofing Attacks on UAS: Detection Techniques Based on Machine and Deep Learning |
Chris |
Kanich |
CNS-1801663 |
Enabling Long-Term Security and Privacy through Retrospective Data Management |
Apu |
Kapadia |
1814476 |
Socio-Technical Strategies for Enhancing Privacy in Photo Sharing |
Apu |
Kapadia |
1814513, 1814866 |
Tangible Privacy: User-Centric Sensor Designs for Assured Privacy |
Nathan |
Kaplan |
DMS 1802281 |
Counting Problems in Number Theory: Elliptic and Plane Quartic Curves over Finite Fields |
Robert |
Karam |
DGE-1954259 |
SaTC: EDU: Improving Student Learning through Competitive Embedded System Security Challenges |
Nima |
Karimian |
2104520 |
Physical Side Channel Attacks in Biometric System |
Omer |
Khan |
1929261 |
SaTC: CORE: Small: A Secure Processor that Exploits Multicore Parallelism while Protecting Against Microarchitecture State Attacks |
Mohammad |
Khan |
1750908 |
CAREER: The Role of Emotion and Social Motives in Communicating Risk: Implications for User Behavior in the Cyber Security Context |
Latifur |
Khan |
1931800 |
Curriculum Development for Secure Blockchain Technologies |
Latifur |
Khan |
2039542 |
Secure and Privacy-Preserving Adaptive Artificial Intelligence Curriculum Development for Cyber Security |
Anurag |
Khandelwal |
2054957 |
Mixed Distribution Models for Encrypted Data Stores |
Farshad |
Khorrami |
2039615 |
NSF SATC: TTP: Small: Tracking Run-time Anomalies in Code Execution (TRACE) |
Aleksandra |
Korolova |
1943584 |
CAREER: Towards Privacy and Fairness in Multi-Sided Platforms |
David |
Kotz |
CNS-1955805, 1955172, 1955228, 1955231 |
SPLICE: Security and Privacy in the Lifecycle of IoT for Consumer Environments |
Brent |
Lagesse |
2113954, 2113955 |
EAGER: SaTC: EDU: AI-enhanced Cybersecurity: Workforce Needs and Barriers to Learning |
Yingjie |
Lao |
2047384 |
CAREER: Protecting Deep Learning Systems against Hardware-Oriented Vulnerabilities |
Loukas |
Lazos |
1813401 |
SaTC: CORE: Small: Secure Cloud Storage Verification Methods |
Kisung |
Lee |
2032745 |
RAPID: Investigating Public Health and Social Information Disparities During the COVID-19 Pandemic |
Jaewoo |
Lee |
1943046 |
CAREER: Robust Adaptive Optimization Algorithms for Differentially Private Learning |
Kyumin |
Lee |
1755536 |
Tracking, Revealing and Detecting Crowdsourced Manipulation |
Adam |
Lee |
1704139, 1703853 |
Scalable Dynamic Access Control for Untrusted Cloud Environments |
Ada |
Lerner |
CNS-1948344 |
Understanding and Addressing the Security and Privacy Needs of At-Risk Populations |
Jun |
Li |
1564348, 1564250, 1564039 |
Collaborative: Online Social Network Fraud and Attack Research and Identification |
Zhou |
Li |
2039634 |
Multi-Level Attack and Defense Simulation Environment for Artificial Intelligence Education and Research |
Frank |
Li |
2055549 |
SaTC: CORE: Small: Understanding, Analyzing, and Improving Password Authentication Practices across the Web |
Qinghua |
Li |
1751255 |
Towards Automated Security Vulnerability and Patch Management for Power Grid Operations |
Dan |
Lin |
2027398, 2027114 |
Self-Learning and Self-Evolving Detection of Altered, Deceptive Images and Videos |
Hui |
Lin |
2144513 |
PARP: Mislead Physical-Disruption Attacks by Preemptive Anti-Reconnaissance for Power Grids' Cyber-Physical Infrastructures |
Heather |
Lipford |
1814110, 1814068, 1814439 |
Leveraging Community Oversight to Enhance Collective Efficacy for Privacy and Security |
Ling |
Liu |
2038029 |
Privacy Enhancing Techniques and Innovations for AI-Cybersecurity Cross Training |
Yao |
Liu |
2024300 |
Creating Content Verification Tools to Protect Document Integrity |
Wenjing |
Lou |
1916902, 1916926 |
Toward Enforceable Data Usage Control in Cloud-based IoT Systems |
Lannan |
Luo |
CNS-1953073 |
SaTC: CORE: Small: Semantics-Oriented Binary Code Analysis Learning from Recent Advances in Deep Learning |
Siwei |
Lyu |
2153112 |
SaTC: CORE: Small:
Combating AI Synthesized Fake Media Beyond Detection |
Hemanta |
Maji |
2055605 |
SaTC: CORE: Small: Optimal Coin-flipping Protocols |
Hafiz |
Malik |
1815724, 1816019 |
Forensic Examiner: Testbed for Benchmarking Digital Audio Forensic Algorithms |
Hafiz |
Malik |
2035770 |
Linking2Source: Security of In-Vehicle Networks via Source Identification |
Athina |
Markopoulou |
1956393, 1955227, 2103439, 1956435 |
ProperData: Protecting Personal Data Flow on the Internet |
Florence |
Martin |
2015554 |
Digital Safety Immersion for Elementary School Students |
Amirreza |
Masoumzadeh |
2047623 |
CAREER: Black-Box Learning of Web Application Authorization Policies |
Aaron |
Massey |
1938121 |
Enabling Regulatory Compliance for Software Engineering |
Michelle |
Mazurek |
1801545, 1801633 |
Understanding Security in the Software Development Lifecycle: A Holistic, Mixed-Methods Approach |
Patrick |
McDaniel |
1805310 |
The Center for Trustworthy Machine Learning |
Muhammad Taqi Raza |
Mehdi |
CNS-2051621 |
Automatic Exploits Detection and Mitigation for Industrial Control System Protocols |
Hoda |
Mehrpouyan |
1846493 |
CAREER: Formal TOols foR SafEty aNd Security of Industrial Control Systems (FORENSICS) |
Peihan |
Miao |
2055358 |
SaTC: CORE: Small: Expanding the Realm of Oblivious Transfer: New Tools for Cryptography |
Stephen |
Miller |
CNS-2124692 |
Lattices, number theory, and distribution questions in cryptography |
Andrew |
Miller |
2112726, 2112751 |
Hybridizing Trusted Execution Environments and Secure Multiparty Computation |
Jiang |
Ming |
2128703 |
SaTC: CORE: Small: A Transparent and Customizable Android Container-Based Virtualization Architecture for Dynamic Malware Analysis |
Jelena |
Mirkovic |
1815495 |
SaTC: CORE: Small: Hardening Systems Against Low-Rate DDoS Attacks |
Prabhat |
Mishra |
1936040 |
SaTC: CORE: Small: Trustworthy System-on-Chip Design using Secure On-Chip Communication Architecture |
Tyler |
Moore |
1652610 |
CAREER: Developing Robust Longitudinal Indicators and Early Warnings of Cybercrime |
Chrystalla |
Mouza |
1821794 |
Cybersecurity Education Using Interactive Storytelling with Social Robots |
Frank |
Mueller |
1813004 |
T-Sys & T-Pack: Intrusion Detection for CPS |
Manohar |
Murthi |
2123635, 2123618 |
Multi-Disciplinary Analyses of the Nature and Spread of Unverified Information Online |
Adwait |
Nadkarni |
1815336 |
SaTC: CORE: Small: Enabling Systematic Evaluation of the Soundness of Android Security Analysis Techniques |
Hoda |
Naghibijouybari |
2130978 |
SaTC: CORE: Small: Microarchitectural side channel attacks and defenses in integrated CPU-GPU systems |
Tempestt |
Neal |
2039373, 2039379 |
Toward Age-Aware Continuous Authentication on Personal Computing Devices |
Ida |
Ngambeki |
1934269, 1934279, 1934285 |
An Assessment Driven Approach to Self-Directed Learning in Secure Programming (SecTutor) |
Nick |
Nikiforakis |
1941617 |
CAREER: Tools and Techniques for Preserving Integrity on the Web |
Nick |
Nikiforakis |
1813974 |
SaTC: CORE: Small: Understanding, Measuring, and Defending against Malicious Web Crawlers |
Rui |
Ning |
2153358 |
CRII: SaTC: Backdoor Detection, Mitigation, and Prevention in Deep Neural Networks |
Chandra |
Orrill |
2114981 |
Opening Doors for Cybersecurity & AI: An Interdisciplinary Approach to Engaging Middle School Students |
Laura |
Osburn |
1932769 |
Medium: Knowledge Work and Coordination to Improve O&M and IT Collaboration to Keep Our Buildings Smart AND Secure |
Balaji |
Palanisamy |
2020071 |
Blockchain-based Mechanisms for Timed Data Release and Timed Transactions |
Anand |
Panangadan |
2125654 |
SCC-IRG Track 2: Designing and Testing Remote Services to Support Formerly Homeless Persons in Permanent Housing |
Omkant |
Pandey |
2028920 |
SaTC: CORE: Small: Nested Black-Box Constructions in Cryptography |
Charalampos |
Papamanthou |
1652259 |
Efficient and Secure Distributed Consensus |
Bryan |
Parno |
1801369, 1801321 |
Automated Support for Writing High-Assurance Smart Contracts |
Yilang |
Peng |
2150723 |
Collaborative Research: SaTC: CORE: Small: Understanding How Visual Features of Misinformation Influence Credibility Perceptions |
Roberto |
Perdisci |
2126641 |
Defending Against Social Engineering Attacks with In-Browser AI |
Alfredo |
Perez |
1950416 |
An REU Site in Security and Privacy for Mobile Sensing and the IoT |
Hai |
Phan |
CNS-1935928, 1935923 |
When Adversarial Learning Meets Differential Privacy: Theoretical Foundation and Applications |
James |
Pierce |
1910218, 2142795 |
Multidisciplinary Design Approaches to IoT Privacy and Security |
Michalis |
Polychronakis |
2104148 |
SaTC: CORE: Small: Selective Data Protection against Data-oriented and Transient Execution Attacks |
Atul |
Prakash |
2039445 |
Identifying Educational Conceptions and Challenges in Cybersecurity and Artificial Intelligence |
Viktor |
Prasanna |
2104264 |
Accelerating Privacy Preserving Deep Learning for Real-time Secure Applications |
Calton |
Pu |
2039653 |
Live Reality: Sustainable and Up-to-Date Information Quality in Live Social Media through Continuous Evidence-Based Knowledge |
Yanjun |
Qi |
CNS-124538 |
Generalizing Adversarial Examples in Natural Language: White-box Testing of NLP models with Mask Neuron Coverage |
Mizanur |
Rahman |
2104999 |
CRII: SaTC: Cyber Resilient Localization and Navigation for Autonomous Vehicles |
Akond |
Rahman |
2026869 |
eSLIC: Enhanced Security Static Analysis of Configuration Scripts |
Ajita |
Rattani |
2129173 |
Probing Fairness of Ocular Biometrics Methods Across Demographic Variations |
Indrakshi |
Ray |
CNS-1715458 |
Detecting and Reconstructing Network Anomalies and Intrusions in Heavy Duty Vehicles |
Julia |
Rayz |
2039605 |
EAGER: SaTC-EDU: AI-based Humor-Integrated Social Engineering (SE) Training |
Bradley |
Reaves |
CNS-1849994 |
CRII: SaTC: Techniques for Measuring and Characterizing Robocalls |
Aunshul |
Rege |
2032292 |
SaTC: EDU: Educating STEM Students and Teachers about the Relevance of Social Engineering in Cyberattacks and Cybersecurity |
Matthew |
Reimherr |
SES-1853209 |
Formal Privacy for Complex Data Objects |
Ling |
Ren |
2143058 |
CAREER: Algorithms Foundations of Blockchains |
Yi |
Ren |
2101052 |
SaTC: Core: Small: Decentralized Attribution and Secure Training of Generative Models |
Franziska |
Roesner |
2041894 |
Studying Problematic Content in the Web Advertising Ecosystem |
Franziska |
Roesner |
1651230 |
CAREER: Towards Secure Augmented Reality Platforms |
Jennie |
Rogers |
2016240, 2016393 |
Quicksilver: A Write-Oriented Private, Outsourced Database Management System |
Jerzy |
Rozenblit |
CNS-1615890 |
SAFES: A Software-based Architecture for Ensuring Security and Resilience in Medical Device Design |
Alexander |
Russell |
1801487 |
Theory and Practice of Cryptosystems Secure Against Subversion |
Goel |
Sanjay |
1912874 |
Thwarting the Malicious Insider Evolution Process: The Theory of Strained Betrayal |
Armin |
Sarabi |
20122001 |
A Deep Learning Framework for Intelligent Active and Passive Measurements in the Age of Internet of Things |
Ioannis |
Savidis |
CNS-1751032 |
Parameter Obfuscation: A Novel Methodology for the Protection of Analog Intellectual Property |
Jarecki |
Saxena |
2030575 |
Intrusion-Tolerant Outsourced Storage for Cyber-Infrastructure (TTP: Medium) |
Alessandra |
Scafuro |
1717067, 1764025 |
A Broad Treatment of Privacy in Blockchains |
Patrick |
Schaumont |
1931639 |
SaTC: CORE: Small: Finding and Mitigating Side-channel Leakage in Embedded Architectures |
David |
Schuster |
1553018 |
CAREER: Understanding the Cognitive Processes of Computer Network Defense |
Alexander |
Schwarzmann |
2131538 |
A Robust Framework with Rigorous Semantics and Security Guarantees for Election-Day Voter Check-in |
Kent |
Seamons |
1816929 |
Usable Key Management and Forward Secrecy for Secure Email |
Vyas |
Sekar |
1564009 |
Handling a Trillion Unfixable Flaws on Billions of Internet-of-Things |
R |
Sekar |
1918667 |
RADAR: Real-time Advanced Detection and Attack Reconstruction |
Hossain |
Shahriar |
2100115 |
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware |
Micah |
Sherr |
CNS-1925497 |
Expanding Research Frontiers with a Next-Generation Anonymous Communication Experimentation (ACE) Framework |
Weisong |
Shi |
CNS-1928331, 1928349 |
SaTC: CORE: Small: Collaborative: Hardware-assisted Plausibly Deniable System for Mobile Devices |
Katie |
Shilton |
2131508 |
Community-Centered Design of Automated Content Moderation |
Vitaly |
Shmatikov |
1916717 |
Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures |
Tao |
Shu |
2006998 |
Enabling Privacy-Preserving Routing-on-Context in IoT |
Craig |
Shue |
1814402 |
Fine-Grained Protection for Scalable Single-use Services |
Akbar |
Siami Namin |
1564293 |
SBE: Medium: User-Centric Design of a Sonification System for Automatically Alarming Security Threats and Impact |
Akbar |
Siami Namin |
1821560 |
SaTC: EDU: Improving Student Learning and Engagement in Digital Forensics through Collaborative Investigation of Cyber Security Incidents and Simulated Capture-The-Flag Exercises |
Yasin |
Silva |
2036127 |
BullyBlocker - Interdisciplinary Models to Identify and Understand Cyberbullying |
Alice |
Silverberg |
1703321, 1701567, 1701785 |
An Algebraic Approach to Secure Multilinear Maps for Cryptography |
Radu |
Sion |
2052951 |
SATC: CORE: Small: Efficient Plausible Deniability Systems |
Rebecca |
Slayton |
1553069 |
Enacting Cybersecurity Expertise |
Linhai |
Song |
CNS-1955965 |
Understanding and Detecting Memory Bugs in Rust |
WenZhan |
Song |
2019311 |
Cyber-threat Detection and Diagnosis in Multistage Manufacturing Systems through Cyber and Physical Data Analytics |
Houbing |
Song |
1956193 |
SaTC: EDU: Collaborative: Bolstering UAV Cybersecurity Education through Curriculum Development with Hands-on Laboratory Framework |
Drew |
Springall |
2115025 |
EAGER: Transformative Educational Approaches to Meld Artificial Intelligence and Cybersecurity Mindsets |
Anna |
Squicciarini |
CNS-2029976, 2029881 |
Collaborative research: SaTC: Core: Small: Privacy protection of Vehicles Location in Spatial Crowdsourcing Under Realistic Adversarial Models |
Meera |
Sridhar |
1947295 |
Enhancing Security Education in Hybrid Mobile and Internet of Things Firmware Through Inclusive, Engaging, Learning Modules (E-SHIIELD) |
Sudarshan |
Srinivasan |
2117190 |
SaTC: CORE: Small: Formal Verification Techniques For Microprocessor Security Vulnerabilities and Trojans |
Katherine |
Stange |
CNS-1652238 |
CAREER: Research and Education: Number Theory, Geometry and Cryptography |
Kate |
Starbird |
2120496 |
Rapid-Response Frameworks for Mitigating Online Disinformation |
Kevin |
Steinmetz |
1916284 |
SaTC: Core: Small: Collaborative: Understanding Law-Enforcement Cyber Investigations |
Alley |
Stoughton |
1801564 |
Towards Mechanized Proofs of Composable Security Properties |
Gianluca |
Stringhini |
2114407 |
Detecting Accounts Involved in Influence Campaigns on Social Media |
Megan |
Stubbs-Richardson |
2031246 |
RAPID: Analyses of Emotions Expressed in Social Media and Forums During the COVID-19 Pandemic |
Cynthia |
Sturton |
1816637 |
SaTC STARSS: Tackling the Corner Cases: Finding Security Vulnerabilities in CPU Designs |
Xiaoyan |
Sun |
2105801 |
Developing Ready-to-Use Hands-on Labs with Portable Operating Environments for Digital Forensics Education |
Shreyas |
Sundaram |
CNS-1718637 |
The Impacts of Human Decision-Making on Security and Robustness of Interdependent Systems |
Daniel |
Takabi |
2006329 |
SaTC: CORE: Small: An Attribute-based Insider Threat Mitigation Framework |
Daniel |
Takabi |
2054968 |
SaTC: EDU: Secure and Private Artificial Intelligence |
Ravi |
Tandon |
1715947 |
SaTC: CORE: Small: Robust Physical Layer Security with Channel Knowledge Uncertainty |
Yuzhe |
Tang |
1922507 |
SaTC: CORE: Small: External Obliviousness in Trusted Execution Environments |
Yuzhe |
Tang |
2104532 |
Collaborative Research: SaTC: EDU: Developing Instructional Laboratories for Blockchain Security Applications |
Unal |
Tatar |
1948261 |
CRII: SaTC: Graph-based Probabilistic Cyber Risk Modeling |
Himanshu |
Thapliyal |
1845448 |
CAREER: Utilizing Principles of Energy Recovery Computing for Low-Energy and DPA-Resistant IoT Devices |
Yuan |
Tian |
1943100 |
CAREER: Secure Voice-Controlled Platforms |
Andrew |
Tolmach |
2048499 |
Specifying and Verifying Secure Compilation of C Code to Tagged Hardware |
Stavros |
Tripakis |
1801546, 1801342, 1801399 |
SaTC: CORE: Medium: Collaborative: Bridging the Gap Between Protocol Design and Implementation through Automated Mapping |
Timothy |
Tsai |
1948531 |
A Cross-Verification Approach for Identifying Tampered Audio |
Michael Carl |
Tschantz |
2055772, 2055773 |
Narrowing The Gap Between Privacy Expectations and Reality in Mobile Health |
Guan-Hua |
Tu |
1815636 |
Side-channel Attacks Against Mobile Users: Singularity Detection, Behavior Identification, and Automated Rectification |
Carlene |
Turner |
1956428 |
Excellence in Research - The Impact of Cybersecurity Policies on Employees' Efficiency and Performance Predictability |
Jonathan |
Ullman |
2120603, 2120611, 2120667, 2120544 |
Foundations for the Next Generation of Private Learning Systems |
Blase |
Ur |
2047827 |
CAREER: Usable, Data-Driven Transparency and Access for Consumer Privacy |
Krishna |
Venkatasubramanian |
1947022 |
SaTC: CORE: Small: Authentication Solutions for Individuals with Upper Extremity Impairment |
Christelle |
Vincent |
DMS-1802323 |
Applications to Cryptography of the Construction of Curves from Modular Invariants |
Jessica |
Vitak |
1951688 |
SaTC EDU: Collaborative: Connecting Contexts: Building Foundational Digital Privacy and Security Skills for Elementary School Ch |
Ting |
Wang |
1953893 |
Trustworthy Machine Learning from Untrusted Models |
Boyang |
Wang |
1947913 |
CRII: SaTC: Fingerprinting Encrypted Voice Traffic on Smart Speakers |
Gang |
Wang |
2055233 |
SaTC: CORE: Small: Towards Label Enrichment and Refinement to Harden Learning-based Security Defenses |
Gang |
Wang |
2030521 |
CAREER: Machine Learning Assisted Crowdsourcing for Phishing Defense |
Yang |
Wang |
2114991 |
Teach High School Students about Cybersecurity and AI Ethics via Empathy-Driven Hands |
Yang |
Wang |
1652497 |
Inclusive Privacy and Security for People with Visual Impairments (PVI) |
XiaoFeng |
Wang |
1801432, 1850725, 1801652 |
SaTC: CORE: Medium: Collaborative: Understanding and Discovering Emerging Cybercrimes through Automatic Analysis of Online Text |
Shuo |
Wang |
1812071 |
SaTC: TTP: Medium: Collaborative: RESULTS: Reverse Engineering Solutions on Ubiquitous Logic for Trustworthiness and Security |
Tao |
Wei |
2027069 |
SaTC: CORE: Medium: Introducing DIVOT: A Novel Architecture for Runtime Anti-Probing/Tampering on I/O Buses |
Sheng |
Wei |
1912593 |
Security of Heterogeneous CPU-FPGA Systems |
Jin |
Wei-Kocsis |
2114974 |
EAGER: SaTC-EDU: Cybersecurity Education in the Age of Artificial Intelligence: A Novel Proactive and Collaborative Learning Paradigm |
Eliane |
Wiese |
2041960 |
EAGER: SaTC-EDU: Teaching Security in Undergraduate AI with Transparency and Contextualization |
Eric |
Williams |
2037535 |
SaTC: CORE: Small: Managing Privacy and Environment for Used and End-of-Life Electronic Devices |
Jake |
Williams |
1850014 |
Moderating Effects of Automation on Information Transmission in Social Forums |
Laurie |
Williams |
2055554 |
SaTC: CORE: Small: Risk-based Secure Checked-in Credential Reduction for Software Development |
Laurie |
Williams |
1909516 |
SHF: Small: Detecting the 1%: Growing the Science of Vulnerability Detection |
Shomir |
Wilson |
2105736 |
A Large-Scale, Longitudinal Resource to Advance Technical and Legal Understanding of Textual Privacy Information |
Damon |
Woodard |
2131480 |
SaTC: I-C-U: AI-Enabled Recovery and Assurance of Semiconductor IP from SEM Images |
David |
Wu |
2151131 |
SaTC: CORE: Small: Expanding the Frontiers of Lattice-Based Cryptography |
Xusheng |
Xiao |
2028748 |
Scalable Cyber Attack Investigation using Declarative Queries and Interrogative Analysis |
Jiafeng |
Xie |
2020625 |
SaTC: CORE: Small: Fast Algorithm Originated Fault Detection Scheme for Ring-LWE based Cryptographic Hardware |
Li |
Xiong |
2124104 |
PREMED: Privacy-Preserving and Robust Computational Phenotyping using Multisite EHR Data |
Weifeng |
Xu |
2039289 |
Exploring Visualized and Explainable AI to Improve Students' Learning Experience in Digital Forensics Education |
Dianxiang |
Xu |
1954327 |
TWC: Small: Benchmarking Testing Methods for Access Control Policies |
Shouhuai |
Xu |
2122631 |
A Framework for Enhancing the Resilience of Cyber Attack Classification Mechanisms |
Jun |
Xu |
2213727 |
Collaborative Research: SaTC: CORE: Medium: Rethinking Fuzzing for Security |
Dongpeng |
Xu |
1948489 |
Simplification of Mixed Boolean-Arithmetic Obfuscated Expression |
Qiben |
Yan |
1950171 |
Interactive Attack on Smartphone Voice Systems |
Mengjia |
Yan |
2046359 |
A Quantitative Framework for Analyzing and Mitigating Microarchitectural Side Channels |
Baijian |
Yang |
1820573, 1820608 |
CHEESE: Cyber Human Ecosystem of Engaged Security Education |
Danfeng |
Yao |
1929701 |
SaTC: TTP: Medium: Collaborative: Deployment-quality and Accessible Solutions for Cryptography Code Development |
Fan |
Yao |
2019536, 2019548 |
SaTC: Small: Understanding and Taming Deterministic Model Bit Flip Attacks in Deep Neural Networks |
Attila A |
Yavuz |
1917627 |
CAREER: Lightweight and Fast Authentication for Internet of Things |
Tuba |
Yavuz |
CNS-1942235 |
CAREER: Towards a Secure and Reliable Internet of Things through Automated Model Extraction and Analysis |
Arkady |
Yerukhimovich |
1955620, 1955264, 1955319 |
New Approaches for Large Scale Secure Computation |
Heng |
Yin |
1719175 |
Towards Robust and Scalable Search of Binary Code and Data |
Man-Ki |
Yoon |
1945541 |
SaTC: CORE: Small: Partition-Oblivious Real-Time Hierarchical Scheduling |
Jeffrey |
Yost |
2022484 |
EAGER: Mining a Useable Past: Perspectives, Paradoxes, & Possibilities in Security and Privacy |
Chansu |
Yu |
2028397 |
SaTC: EDU: Transdisciplinary Cybersecurity Education for Law and Engineering Students |
Philip |
Yu |
1930941 |
Learning Dynamic and Robust Defenses Against Co-Adaptive Spammers |
Qiaoyan |
Yu |
1652474 |
CAREER: Proactive Defense Methods for Chip Integrity and Security |
Qiaoyan |
Yu |
2022279 |
SaTC:CORE:Small: Towards Securing the Hardware and Software for Approximate Computing Systems |
Shucheng |
Yu |
1817438 |
Toward Usable and Ubiquitous Trust Initialization and Secure Networking in Wireless Ad Hoc Networks |
Shuhan |
Yuan |
2103829 |
SaTC: CORE: Small: Deep Learning for Insider Threat Detection |
Qiang |
Zeng |
CNS-1856380 |
SaTC: CORE: Small: Collaborative: Enabling Precise and Automated Insecurity Analysis of Middleware on Mobile Platforms |
Zhenkai |
Zhang |
CNS-2147217 |
SaTC: CORE: Small: Leveraging Physical Side-Channel Information to Build Detection-Based Rowhammer Defenses |
Danfeng |
Zhang |
1956032 |
Automatic Software Patching against Microarchitectual Attacks |
Ziming |
Zhao |
2037798 |
Securing Internet of Things Against Cache-based Attacks |
Yanbin |
Zhao |
1949650 |
SaTC: CORE: Medium: Hidden Rules in Neural Networks as Attacks and Adversarial Defenses |
Zizhan |
Zheng |
CNS-1816495 |
SaTC: CORE: Small: Towards Robust Moving Target Defense: A Game Theoretic and Learning Approach |
Qian |
Zhiyun |
1953932, 1953933 |
SaTC: CORE: Small: Collaborative: Deep and Efficient Dynamic Analysis of Operating System Kernels |
Hai |
Zhou |
2113704 |
Efficient Logic Encryptions for Hardware IP Protection |
Lina |
Zhou |
1917537 |
Implicit One-handed Mobile User Authentication by Induced Thumb Biometrics on Touch-screen Handheld Devices |
Sebastian |
Zimmeck |
2055196 |
Improving Internet Privacy with Global Privacy Control (GPC) |
Rae |
Zimmerman |
2122060 |
Understanding Human Misperception of Cyber Risks and Integrative Design of Human-Centered Intervention Mechanisms: Component |
Cliff |
Zou |
1915780 |
SaTC: EDU: Collaborative: Building a Low-cost and State-of-the-art IoT Security Hands-on Laboratory |
Xukai |
Zou |
DGE-2011117, 2011175 |
Building an Electronic Voting Technology Inspired Interactive Teaching and Learning Framework for Cybersecurity Education |